GITCBot: A Novel Approach for the Next Generation of C&C Malware

09/10/2022
by   saeid ghasemshirazi, et al.
0

Online Social Networks (OSNs) attracted millions of users in the world. OSNs made adversaries more passionate to create malware variants to subvert the cyber defence of OSNs. Through various threat vectors, adversaries persuasively lure OSN users into installing malware on their devices at an enormous scale. One of the most horrendous forms of named malware is OSNs’ botnets that conceal C&C information using OSNs’ accounts of unaware users. In this paper, we present GITC (Ghost In The Cloud), which uses Telegram as a C&C server to communicate with threat actors and access targets’ information in an undetectable way. Furthermore, we present our implementation of GITC. We show how GITC uses the encrypted telegram Application Programming Interface (API) to cover up records of the adversary connections to the target, and we discuss why current intrusion detection systems cannot detect GITC …

READ FULL TEXT
research
07/06/2019

Intelligent Systems Design for Malware Classification Under Adversarial Conditions

The use of machine learning and intelligent systems has become an establ...
research
08/27/2021

Mal2GCN: A Robust Malware Detection Approach Using Deep Graph Convolutional Networks With Non-Negative Weights

With the growing pace of using machine learning to solve various problem...
research
04/11/2022

Active and Passive Collection of SSH key material for cyber threat intelligence

This paper describes a system for storing historical forensic artefacts ...
research
11/27/2021

Evading Malware Analysis Using Reverse Execution

Malware is a security threat, and various means are adapted to detect an...
research
06/27/2023

Malware Finances and Operations: a Data-Driven Study of the Value Chain for Infections and Compromised Access

We investigate the criminal market dynamics of infostealer malware and p...
research
12/03/2020

Using Side Channel Information and Artificial Intelligence for Malware Detection

Cybersecurity continues to be a difficult issue for society especially a...
research
09/16/2019

Encrypted and Covert DNS Queries for Botnets: Challenges and Countermeasures

There is a continuous increase in the sophistication that modern malware...

Please sign up or login with your details

Forgot password? Click here to reset